dtool 0.17.0

A command-line tool collection to assist development
use linked_hash_map::LinkedHashMap;
use secp256k1::hashes::sha256;
use secp256k1::rand::thread_rng;
use secp256k1::{ecdsa, Message, PublicKey, Secp256k1, SecretKey};

use crate::modules::ecdsa::SignatureFormEnum;
use crate::modules::Case;

pub fn ec_gk_secp256k1(compress: bool) -> Result<(Vec<u8>, Vec<u8>), String> {
	let (secret_key, public_key) = secp256k1::Secp256k1::new().generate_keypair(&mut thread_rng());

	let secret_key: Vec<u8> = secret_key.as_ref().to_vec();

	let public_key = match compress {
		true => public_key.serialize().to_vec(),
		false => public_key.serialize_uncompressed().to_vec(),
	};
	Ok((secret_key, public_key))
}

pub fn ec_sign_secp256k1(
	secret_key: Vec<u8>,
	message: Vec<u8>,
	sig_form: SignatureFormEnum,
) -> Result<Vec<u8>, String> {
	let secp = Secp256k1::new();
	let message = Message::from_hashed_data::<sha256::Hash>(&message);
	let secret_key =
		SecretKey::from_slice(&secret_key).map_err(|e| format!("Invalid secret key: {}", e))?;
	let signature = secp.sign_ecdsa(&message, &secret_key);

	let signature = match sig_form {
		SignatureFormEnum::Fixed => signature.serialize_compact().to_vec(),
		SignatureFormEnum::Der => signature.serialize_der().as_ref().to_vec(),
	};

	Ok(signature)
}

pub fn ec_verify_secp256k1(
	public_key: Vec<u8>,
	sig: Vec<u8>,
	message: Vec<u8>,
	sig_form: SignatureFormEnum,
) -> Result<(), String> {
	let secp = Secp256k1::new();
	let message = Message::from_hashed_data::<sha256::Hash>(&message);
	let sig = match sig_form {
		SignatureFormEnum::Fixed => ecdsa::Signature::from_compact(&sig),
		SignatureFormEnum::Der => ecdsa::Signature::from_der(&sig),
	}
	.map_err(|e| format!("Invalid signature: {}", e))?;

	let public_key =
		PublicKey::from_slice(&public_key).map_err(|e| format!("Invalid secret key: {}", e))?;
	let result = secp
		.verify_ecdsa(&message, &sig, &public_key)
		.map_err(|e| format!("{}", e));
	result
}

pub fn ec_pk_secp256k1(secret_key: Vec<u8>, compress: bool) -> Result<Vec<u8>, String> {
	let secret_key =
		SecretKey::from_slice(&secret_key).map_err(|e| format!("Invalid secret key: {}", e))?;

	let secp = secp256k1::Secp256k1::new();
	let public_key = PublicKey::from_secret_key(&secp, &secret_key);

	let public_key = match compress {
		true => public_key.serialize().to_vec(),
		false => public_key.serialize_uncompressed().to_vec(),
	};

	Ok(public_key)
}

pub fn cases() -> LinkedHashMap<&'static str, Vec<Case>> {
	vec![
        ("ec_gk",
         vec![
             Case {
                 desc: "Secp256k1".to_string(),
                 input: vec!["-c", "secp256k1", "-C"].into_iter().map(Into::into).collect(),
                 output: vec!["(0x9cbe9cd5d7759ca46296f64e3e8211ef5ccaf86b5cb7169711554d1ed2ed68ca, 0x0379ce37925295f3103855da38ee2bf0e06a60ec9d86806d0efd2de3649a74b40d)"].into_iter().map(Into::into).collect(),
                 is_example: true,
                 is_test: false,
                 since: "0.7.0".to_string(),
             },
         ]),
        ("ec_sign",
         vec![
             Case {
                 desc: "Secp256k1".to_string(),
                 input: vec!["-c", "secp256k1", "-s", "0x9cb4f775e9b67118242cea15285555c287a7e3d2f86ba238c1fe87284b898e9a", "0x616263"].into_iter().map(Into::into).collect(),
                 output: vec!["0x7c77b65a27984b0e124a0ae2eec6bbf2b338a5c999b943abda576108f92e95364b0b983da055493c87fd138fe5673992b2a48ef85d9ad30c98fc1afcc5fc7bc0"].into_iter().map(Into::into).collect(),
                 is_example: true,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
             Case {
                 desc: "Secp256k1 DER signature form".to_string(),
                 input: vec!["-c", "secp256k1", "-s", "0x9cb4f775e9b67118242cea15285555c287a7e3d2f86ba238c1fe87284b898e9a", "-f", "der", "0x616263"].into_iter().map(Into::into).collect(),
                 output: vec!["0x304402207c77b65a27984b0e124a0ae2eec6bbf2b338a5c999b943abda576108f92e953602204b0b983da055493c87fd138fe5673992b2a48ef85d9ad30c98fc1afcc5fc7bc0"].into_iter().map(Into::into).collect(),
                 is_example: false,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
         ]),
        ("ec_verify",
         vec![
             Case {
                 desc: "Secp256k1".to_string(),
                 input: vec!["-c", "secp256k1", "-p", "0x03391aa7238b79e1aad1e038c95306171a8ac7499357dc99586f96c5f3b9618d60", "-S",
                             "0x7c77b65a27984b0e124a0ae2eec6bbf2b338a5c999b943abda576108f92e95364b0b983da055493c87fd138fe5673992b2a48ef85d9ad30c98fc1afcc5fc7bc0",
                             "0x616263"].into_iter().map(Into::into).collect(),
                 output: vec!["true"].into_iter().map(Into::into).collect(),
                 is_example: true,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
             Case {
                 desc: "Secp256k1 DER signature form".to_string(),
                 input: vec!["-c", "secp256k1", "-p", "0x03391aa7238b79e1aad1e038c95306171a8ac7499357dc99586f96c5f3b9618d60", "-f", "der", "-S",
                             "0x304402207c77b65a27984b0e124a0ae2eec6bbf2b338a5c999b943abda576108f92e953602204b0b983da055493c87fd138fe5673992b2a48ef85d9ad30c98fc1afcc5fc7bc0",
                             "0x616263"].into_iter().map(Into::into).collect(),
                 output: vec!["true"].into_iter().map(Into::into).collect(),
                 is_example: false,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
         ]),
        ("ec_pk",
         vec![
             Case {
                 desc: "Secp256k1".to_string(),
                 input: vec!["-c", "secp256k1", "-s", "0x9cb4f775e9b67118242cea15285555c287a7e3d2f86ba238c1fe87284b898e9a"].into_iter().map(Into::into).collect(),
                 output: vec!["0x04391aa7238b79e1aad1e038c95306171a8ac7499357dc99586f96c5f3b9618d6035af9529d80a85ebecb1120d1cfaf1591b7c686907b0a3d18858a95e86976747"].into_iter().map(Into::into).collect(),
                 is_example: true,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
             Case {
                 desc: "Secp256k1 Compressed public key".to_string(),
                 input: vec!["-c", "secp256k1", "-s", "0x9cb4f775e9b67118242cea15285555c287a7e3d2f86ba238c1fe87284b898e9a", "-C"].into_iter().map(Into::into).collect(),
                 output: vec!["0x03391aa7238b79e1aad1e038c95306171a8ac7499357dc99586f96c5f3b9618d60"].into_iter().map(Into::into).collect(),
                 is_example: true,
                 is_test: true,
                 since: "0.7.0".to_string(),
             },
         ]),
    ].into_iter().collect()
}